Explore >> Select a destination


You are here

pentestlab.blog
| | www.codeproject.com
4.3 parsecs away

Travel
| | A detailed analysis of how to inject the .NET runtime and arbitrary .NET assemblies into unmanaged and managed processes; and how to execute managed code within those processes.
| | bohops.com
4.4 parsecs away

Travel
| | Introduction In recent years, there have been numerous published techniques for evading endpoint security solutions and sources such as A/V, EDR and logging facilities. The methods deployed to achieve the desired result usually differ in sophistication and implementation, however, effectiveness is usually the end goal (of course, with thoughtful consideration of potential tradeoffs). Defenders can...
| | gebir.ge
4.1 parsecs away

Travel
| | [AI summary] The provided text describes a detailed process of exploiting a Windows system through a REST API endpoint, leveraging DLL hijacking and dynamic code execution. The user outlines the steps taken to gain access, including crafting malicious DLLs, using reflection to load assemblies, and executing commands via PowerShell. The text concludes with a reflection on the learning experience and resources used.
| | blog.qasource.com
23.2 parsecs away

Travel
| Read this blog to understand the most important trends in network penetration testing in improving security and why to partner with QASource.